cyber

February 1, 2019
By Robert K. Ackerman
Two U.S. Navy sailors monitor data onboard the USS Jason Dunham during a 6th Fleet area operation. The Naval Information Forces command is consolidating information warfare activities and training to standardize all aspects of the domain across the Navy. U.S. Navy photo

The U.S. Navy is consolidating its information warfare efforts to ensure effective operations across the breadth of the fleet and its ashore assets. This endeavor ties together training, doctrine and equipping as new threats and technologies rapidly change the nature of the information operations realm.

February 1, 2019
By Kimberly Underwood
The Coast Guard faces bandwidth challenges, and the service is looking at how to optimize applications on smaller ships.

The U.S. Coast Guard is pursuing digital solutions to support its unique set of military, law enforcement, humanitarian, regulatory and diplomatic responsibilities. It is no small feat to provide information technology to its workforce of 87,570, as well as to its cutters, boats, and aircraft that move along the coastline and inland waterways protecting the United States.

February 1, 2019
By George I. Seffers
The USS Detroit (LCS 7) conducts acceptance trials, the last significant milestone before delivery to the Navy, in 2016. The Information Warfare Research Project was inspired in part by the National Shipbuilding Research Program initiated in 1971.

Months after initiating a project to research and rapidly field information warfare-related technologies, the U.S. Navy has expanded the effort servicewide and expects to field the first system by the end of fiscal year 2019.

The Space and Naval Warfare Systems Command (SPAWAR) Systems Center Atlantic announced last summer the formation of an industry consortium for the Information Warfare Research Project (IWRP). The intent is to leverage the flexible contracting platform known as other transaction authority (OTA) to rapidly develop and deploy technologies.

February 1, 2019
By Capt. Ryan Robinson, USA
Sgt. Kevin Nguyen, USA, a team leader in the 50th Expeditionary Signal Battalion, tests the connection of a Tampa Microwave satellite dish in Camp Arifjan, Kuwait. A team of soldiers from the 50th ESB is testing the mobility and capabilities of their new equipment in locations all over the world. U.S. Army photo by Sgt. Adam Parent, USA

A broad misconception is that the U.S. Army Signal Corps is a single-function organization, but its responsibilities have grown over time, and it is now a vital element of communications support that applies technology to ensure mission success. As much as the Army performs maneuver operations on land, it also performs signal offensive, defensive and stability operations in the cyber domain.

The Army’s Signal officers are expected to perform duties well beyond communications support. Signal organizations are the nexus of cyber and electronic warfare activities.

February 1, 2019
By Kimberly Underwood
When pursuing information technology solutions, the Coast Guard has to be “risk aware” in order to have the tools needed to support its unique set of military, law enforcement, humanitarian, regulatory and diplomatic responsibilities, says Rear Adm. David Dermanelian, USCG, assistant commandant for C4IT (CG-6); and commander, Coast Guard Cyber Command.

Two years’ experience at the U.S. Cyber Command has shaped U.S. Coast Guard Rear Adm. Dermanelian’s perspective as he implements, as commander, the Coast Guard Cyber Command’s three main missions: (1) defending the Coast Guard’s portion of the Department of Defense Information Network, or DODIN; (2) protecting the maritime transportation sector; and (3) enabling cyber operations. The admiral is dual hatted as the assistant commandant for command, control, communications, computers and information technology/CG-6 as well as being the commander of the Coast Guard Cyber Command.

January 23, 2019
By Joe Marino
Delivering innovative technologies into the hands of warfighters requires streamlined acquisition processes. Photo by Marine Corps Lance Cpl. Drake Nickel

The response to the Chief of Naval Operations (CNO) Adm. John Richardson’s repeated request to “pick up the pace” of developing and implementing breakthrough technologies for our warfighters has gone, in my opinion, largely unheeded.

This is not the result of a lack of innovative solutions. A myriad of research and development programs exists to support the development of new technologies or to adapt existing commercial technologies to defense applications. Rather, it’s the result of an arcane acquisition process that is burdensome, expensive and lacking vision. Acquisition reform is where we need to pick up the pace!

January 30, 2019
By Steven Boberski
The U.S. Defense Department has started to integrate unified communications into its Everything Over Internet Protocol strategy, but a wide range of computing platforms, telecommunications systems and other collaboration technologies result in a web of technologies that cannot integrate or interoperate. Credit: geralt/Pixabay

When the Department of Defense (DOD) launched its Everything Over IP initiative nearly 10 years ago the focus was to bring traditional telecommunications technology—phone calls, streaming video and even faxes—to the digital world.

At that time, unified communications (UC), especially in the government workplace, was a relatively new concept. Remember, this was a time when voice over Internet Protocol (VoIP) phones were still seen as cutting edge. Now, though, UC has become not just a business tool, but a strategic offering that can connect employees in disparate locations, including the frontlines.

January 29, 2019
By George I. Seffers
Dan Coats, director of national intelligence, released today the intelligence community’s annual threat assessment, which lists cyber, artificial intelligence and weapons of mass destruction as some of the top technological threats. Credit: geralt/Pixabay

The United States faces a “toxic mix of threats,” Dan Coats, the director of National Intelligence, testified today before the Senate Select Committee on Intelligence while unveiling the annual Worldwide Threat Assessment of the U.S. Intelligence Community.

January 17, 2019
By Robert K. Ackerman
DISA Director Vice Adm. Nancy A. Norton, USN, presents Steve Wallace with his promotion certificate as he takes over the agency’s newly created Emerging Technology (EM) Directorate.

The Defense Information Systems Agency (DISA) has reorganized its technology innovation efforts into a single organization designed both to work with outside research organizations and to operate across internal agency lines. The new organization, known as the Emerging Technologies (EM) Directorate, will tap legacy expertise but apply it in a new approach to incorporating innovation, according to DISA.

January 16, 2019
By Julianne Simpson
Dennis A Crall, USMC, principal deputy cyber advisor, Office of the Secretary of Defense, speaks at CERTS.

The focus of the second annual Cyber Education, Research and Training Symposium (CERTS) is national cyber policy and cyber workforce training. During his keynote address, Brig, Gen. Dennis A Crall, USMC, principal deputy cyber advisor, Office of the Secretary of Defense, stated, “Education and training is assembled for one reason and one reason only, and that’s warfighting."

“Everything we do is based on mission threats,” Gen. Crall added. “We are a mission-oriented group. When we talk about technology, people, training and education ...we don’t do cyber for cyber, we don’t educate for education's sake, we do that for the warfighting mission that we can accomplish.”

January 16, 2019
By Julianne Simpson
Rob Joyce, senior cyber advisor to the director, NSA, talks about the cyber workforce shortage at CERTS.

There is not enough skilled talent for the growing need of the cyber community. Based on a state-by-state analysis on cyberchair.org, there are currently 320,000 open cyber jobs in the United States. Projections get worse. According to a CISCO report, by 2020 there will be 1 million unfilled cyber positions worldwide.

“We need to make systemic changes to address that gap,” said Rob Joyce, senior cybersecurity strategy advisor to the director, National Security Agency (NSA), and former cybersecurity advisor to the president.

January 7, 2019
Posted by George I. Seffers
Research at Sandia National Laboratories may help shape the future of quantum computing. Credit: TheDigitalArtist/Pixabay

Four newly announced projects led by Sandia National Laboratories aim to advance quantum computing technology, according to an announcement from the laboratories.

The efforts include: a quantum computing testbed with accessible components on which industrial, academic and government researchers can run their own algorithms; a suite of test programs to measure the performance of quantum hardware; classical software to ensure reliable operation of quantum computing testbeds and coax the most utility from them; and high-level quantum algorithms that explore connections with theoretical physics, classical optimization and machine learning.

January 1, 2019
By George I. Seffers
The cyber threat offers challenges unique to this moment in history, but the cyber policy, strategy and legislation stars are aligning to counter the threat. Credit: insspirito/Pixabay

The United States faces a threat unlike any in its history. The cyber threat zips around the world at blinding speeds and continually transforms. It can neutralize billion-dollar weapon systems and leave entire cities in the dark. It also can be wielded by superpowers, smaller governments or criminal organizations. At the same time, however, legislation, strategies, policies, authorities and a vigorous spirit of cooperation across government and the international community are all aligning to meet that threat.

January 1, 2019
By David Sheets
Future Army aviation systems will need to be able to operate against adversaries with advanced capabilities even in a contested airspace. Embedded systems need to be designed with cybersecurity in mind and may require some size, weight and power tradeoffs. U.S. Army graphic by Aviation and Missile Research, Development and Engineering Center VizLab

Embedded systems are emerging as the latest challenge in the drive to secure deployed U.S. military technologies, including those residing within weapons and flight controllers. Because they are deeply entrenched inside critical hardware, these systems can be tricky to safeguard, so cybersecurity and cyber resiliency must be considered at the beginning of the design and architecture process. And although upgrades can boost embedded systems’ cybersecurity, system operators must determine when the potential pitfalls of doing so outweigh the benefits.

January 1, 2019
By Rand Waltzman
The ability to create a digital alter ego would put control of sharing personal information in an individual’s hand. Artificial intelligence within the device also would warn an owner when data is likely disinformation aimed at influencing behavior. Credit: sdecoret/Shutterstock.com

Up until the digital age, wars involved a limited number of combatants with clear identities battling within distinct boundaries visible on a map. These conflicts ended either with a victor or as a stalemate. But today’s information warfare does not fit this traditional model. Instead, it comprises an unlimited number of potential combatants, many with hidden identities and agendas.

Cyberspace is a theater of operations that is nowhere and everywhere. Within this domain, information warfare will not and in fact cannot come to any conclusion. This conflict closely resembles an incurable disease that can be managed so the patient can lead a productive life but is never completely cured.

January 1, 2019
By Nicola Whiting
The Automated Virtual Agent for Truth Assessments in Real Time, developed at San Diego State University, can detect changes in physiology and behavior during interviews with travelers. Photo by Aaron Elkins

Artificial intelligence can analyze vast amounts of information, identifying patterns and anomalies at a speed and scale beyond human capacity. To make it an invaluable part of defense, the goal will be to create cybersecurity systems that can anticipate national security threats. Once systems can automatically reconfigure themselves and their security controls to prevent any potential breaches, the next step will be to move to machines with the power to make their own decisions.

November 30, 2018
By Sean Berg
Small contractors remain cyber's weak link in the defense industrial chain. Credit: TheDigitalArtist/Pixabay

The U.S. defense industrial supply chain is vast, complex and vulnerable. Organic components, large-scale integrators, myriad commercial service providers, and tens of thousands of private companies sustain the Defense Department. According to the SANS Institute, the percentage of cyber breaches that originate in the supply chain could be as high as 80 percent.

December 1, 2018
By Shaun Waterman
Credit: sp3n/Shutterstock

Powered by recent advances in artificial intelligence and machine learning, long-hyped technologies such as facial recognition and behavioral biometrics are promising frictionless identity authentication. In the near future, people will be able prove who they are without even trying and sometimes without even knowing they’re doing it.

November 29, 2018
Posted by Julianne Simpson
Credit: Rawpixel.com

Threat researchers from McAfee Labs have released their 2019 cybersecurity threats predictions report. Unfortunately, cyber criminals are expected to become more sophisticated and collaborative as the “underworld” consolidates into stronger malware-as-a-service families actively working together.

Software and security teams will need to adapt as threats become more complex. McAfee predicts more attackers will be using artificial intelligence to avoid detection by security software. “In fact, an entire underground economy has emerged where criminals can now outsource products and dedicated services to aid their activities,” says Thomas Roccia, a researcher on the team.

November 16, 2018
By Robert K. Ackerman
 Brig. Gen. Paul Fredenburgh III, USA, J-6, Indo-Pacific Command, leads a panel discussion on combined cyber operations in the Indo-Pacific region. Credit: Bob Goodwin Photography

Across the vast Indo-Pacific region, all roads lead to cyber, according to a panel of U.S. and foreign military and civilian experts. Speaking on the final day of AFCEA’s TechNet Asia-Pacific 2018, held November 14-16 in Honolulu, the panel discussed the need for interoperability amid growing cybersecurity concerns.

Pages